Improving the information security model by using TH

被引:0
|
作者
Ahlfeldt, Rose-Mharie [1 ]
Spagnoletti, Paolo [2 ]
Sindre, Guttorm [3 ]
机构
[1] Univ Skovde, Box 408, S-54228 Skovde, Sweden
[2] Luiss Guido Carli Univ, CeRSI, Rome, Italy
[3] NTNU, Trondheim, Norway
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the context of information systems and information technology, information security is a concept that is becoming widely used. The European Network of Excellence INTEROP classifies information security as a nonfunctional aspect of interoperability and as such it is an integral part of the design process for interoperable systems. In the last decade, academics and practitioners have shown their interest in information security, for example by developing security models for evaluating products and setting up security specifications in order to safeguard the confidentiality, integrity, availability and accountability of data. Earlier research has shown that measures to achieve information security in the administrative or organisational level are missing or inadequate. Therefore, there is a need to improve information security models by including vital elements of information security. In this paper, we introduce a holistic view of information security based on a Swedish model combined with a literature survey. Furthermore we suggest extending this model using concepts based on semiotic theory and adopting the view of an information system as constituted of the technical, formal and informal (TFI) parts. The aim is to increase the understanding of the information security domain in order to develop a well-founded theoretical framework, which can be used both in the analysis and the design phase of interoperable systems. Finally, we describe and apply the Information Security (InfoSec) model to the results of three different case studies in the healthcare domain. Limits of the model will be highlighted and an extension will be proposed.
引用
收藏
页码:73 / +
页数:4
相关论文
共 50 条
  • [31] Research on information security model and security system design
    Huang, Yi-Min
    Ping, Ling-Di
    Pan, Xue-Zeng
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2001, 35 (06): : 603 - 607
  • [32] Improving security performance of Internet of Medical Things using hybrid metaheuristic model
    Kanneboina A.
    Sundaram G.
    Multimedia Tools and Applications, 2025, 84 (9) : 6403 - 6428
  • [33] Improving Oil Supply Security: Using a Risk Optimization Model to China and India
    Qi, Ming
    Shi, Danyang
    Li, Congcong
    Wu, Jialu
    Wang, Pei
    DISCRETE DYNAMICS IN NATURE AND SOCIETY, 2021, 2021
  • [34] Improving IoT Security Using Blockchain
    AlJemy, Khalid
    AlAnazi, Mohammed
    AlSofiry, Mohammed
    Baig, Adeel
    2019 IEEE 10TH GCC CONFERENCE & EXHIBITION (GCC), 2019,
  • [35] Improving the information security in SMEs to protect customer's personal identifiable information
    Els, Floyd
    Cilliers, Liezel
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON BUSINESS AND FINANCE, 2015, : 75 - 79
  • [36] ICT Crime Cases Autopsy: Using the Adaptive Information Security Systems Model to Improve ICT Security
    Mwakalinga, Jeffy
    Kowalski, Stewart
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (03): : 114 - 123
  • [37] A Simulation Model of Information Systems Security
    Pendegraft, Norman
    Rounds, Mark
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2007, 1 (04) : 62 - 74
  • [38] An Organisational Model for Information Security Assessment
    McKissack, Jeremy
    Hooper, Val
    Hope, Beverley
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND EVALUATION, 2010, : 218 - 227
  • [39] A cryptographic model for better information security
    Kumar, Sunil
    Kumar, Manish
    Budhiraja, Rajat
    Das, M. K.
    Singh, Sanjeev
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 43 : 123 - 138
  • [40] A MODEL FOR ORGANIZING INFORMATION SECURITY DOCUMENTATION
    DUTOIT, LM
    VONSOLMS, SH
    COMPUTER SECURITY, 1993, 37 : 227 - 242